Shellcode

Results: 175



#Item
131Software bugs / Buffer overflow / Shellcode / Machine code / NOP / Data structure alignment / Memory address / Instruction set / Forth / Computing / Software engineering / Computer architecture

STRIDE: POLYMORPHIC SLED DETECTION THROUGH INSTRUCTION SEQUENCE ANALYSIS P. Akritidis1, E. P. Markatos1, M. Polychronakis1, and K. Anagnostakis2 1

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:45:13
132Software bugs / Shellcode / Buffer overflow / Malware / Software testing / Arbitrary code execution / Binary translation / QEMU / Code injection / Software / System software / Cyberwarfare

S HELL OS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose Department of Computer Science University of North Carolina at Chapel Hill, {kzsnow, kri

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-06-09 13:31:36
133Cross-platform software / Java platform / Computer file formats / Adobe Flash / Shellcode / Malware / JAR / JavaScript / Adobe Acrobat / Software / Computing / Graphics file formats

Threat Advisory: Blackhole Exploit Kit

Add to Reading List

Source URL: kc.mcafee.com

Language: English
134Software bugs / Cross-platform software / Heap spraying / Shellcode / Buffer overflow / Address space layout randomization / NOP slide / JavaScript / Garbage collection / Computing / Cyberwarfare / Computer security

N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-06-08 14:53:11
135Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2010-12-28 00:16:40
136FireEye /  Inc. / SecurID / Shellcode / Malware / Botnet / Password / Challenge-response authentication / Calamine / Computer security / Cyberwarfare / Computing

FE_rpt_poisonIvy_fig21_ph2

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-08-11 22:30:03
137Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: vreugdenhilresearch.nl

Language: English - Date: 2010-03-24 14:09:15
138Software quality / Stack buffer overflow / Shellcode / Vulnerability / Stack / X86 instruction listings / Pointer / X86 / Exploit / Computing / Software bugs / Cyberwarfare

University of Oxford Computing Laboratory MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities

Add to Reading List

Source URL: seanhn.files.wordpress.com

Language: English - Date: 2009-09-06 11:29:07
139C POSIX library / Cross-platform software / Oracle Database / Printf format string / Oracle Corporation / Sizeof / Write / Redo log / Shellcode / Software / Computing / Relational database management systems

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2007-10-05 22:44:02
140Computer file formats / Dynamic-link library / Portable Executable / Shellcode / Malware / Backdoor / Library / High Level Assembly / System software / Computing / Espionage

PlugX – The Next Generation By Gabor Szappanos, Principal Researcher A SophosLabs technical paper - June 2014

Add to Reading List

Source URL: www.sophos.com

Language: English - Date: 2014-06-27 14:18:16
UPDATE